VMSA-2018-0011:Unauthenticated Command Injection vulnerability in VMware SD-WAN by VeloCloud

VMware

0 more products

23539

13 May 2018

13 May 2018

CLOSED

HIGH

CVE-2018-6961

VMSA-2018-0011.2

Unauthenticated Command Injection vulnerability in VMware SD-WAN Edge by VeloCloud

VMware Security Advisory
 
VMware Security Advisory Advisory ID:
 VMSA-2018-0011.2
VMware Security Advisory Severity:
 Important
VMware Security Advisory Synopsis:
 Unauthenticated Command Injection vulnerability in VMware SD-WAN Edge by VeloCloud
VMware Security Advisory Issue date:
2018-05-15
VMware Security Advisory Updated on:
 2019-06-13
VMware Security Advisory CVE numbers:
 CVE-2018-6961
 
1. Summary

Unauthenticated Command Injection vulnerability in VMware SD-WAN Edge by VeloCloud

 
2. Relevant Products

 VMware SD-WAN Edge by VeloCloud (SD-WAN Edge)

 
3. Problem Description

Unauthenticated Command Injection vulnerability in VMware SD-WAN Edge by VeloCloud

VMware SD-WAN Edge by VeloCloud contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.

 

VMware would like to thank Cory Mathews, Quentin Rhoads-Herrera, and Maggie Ligon of Critical Start and security researcher Brian Sullivan from Tevora for independently reporting this issue to us.

 

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6961 to this issue.


Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
VMware ProductSD-WAN Edge
Product Version3.x, 2.x
Running on Linux
SeverityImportant
Replace with/ Apply PatchR312-20180716-GA
Mitigation/ Workaround
KB55009  

 

 

4. Solution

 

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.

 

VMware SD-WAN Edge by VeloCloud R312-20180716-GA Support/Guidance:

https://kb.vmware.com/kb/53907

 

  

6. Change log

 

VMSA-2018-0011 2018-05-15

Initial security advisory in conjunction with the release of KB55009 on 2018-05-15.

 

VMSA-2018-0011.1 2018-06-28

Updated security advisory with the correct remediated version (SD-WAN Edge 3.1.2) since SD-WAN Edge 3.1.1 and earlier are still affected.

VMSA-2018-0011.2 2019-06-13
Updated security advisory with to clarify that R312-20180716-GA is the specific build in which CVE-2018-6961 was remediated.

 

7. Contact

 

E-mail list for product security notifications and announcements:

http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

 

This Security Advisory is posted to the following lists:

  [email protected]

  [email protected]

  [email protected]

 

E-mail: [email protected]

PGP key at:

https://kb.vmware.com/kb/1055

 

VMware Security Advisories

http://www.vmware.com/security/advisories

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html

 

VMware Security & Compliance Blog  

https://blogs.vmware.com/security

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2018 VMware Inc. All rights reserved.